McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Non-Chapter Glossary Terms
Non-Chapter Flashcards
Frequently Asked Questions
Student Message Board
Learning Objectives
Chapter Outline
Key Terms
Flashcards
Interactive Activities
Exercises
Multiple Choice Quiz
Feedback
Help Center


Inline Online
Inline/Online: Fundamentals of the Internet and the World Wide Web, 2/e
Raymond Greenlaw, Armstrong Atlantic State University
Ellen Hepp, The University of New Hampshire

Telnet and FTP

Chapter 6 Key Terms

This glossary contains a list of important terms used in the text. Both the terms and their meanings are presented. This list is not intended to be exhaustive. For example, many of the HTML concepts are not included, but can easily be traced through the index.
anonymous file transfer  A mechanism that allows any user to transfer a file from a system.
(See 258-260, 631)
Archie  A program that is useful for searching file archives.
(See 260, 631)
binary transfer mode  A file transfer mode setting that allows binary files, such as executable programs and images, to be transferred.
(See 248, 632)
file compression  A means of reducing a file’s size by encoding the contents so that the file takes up less space.
(See 258, 636)
file transfer  A way of transferring files from one computer to another computer, using a network. (See also FTP.)
(See 4, 100, 243-261, 631)
freeware  Software that you can use at no charge. The author usually retains any copyright on it, and freeware frequently is unregistered. The source code is usually not provided.
(See 258-260, 327, 637)
kilobyte  1,000 bytes; a unit of measurement often associated with file size or transfer rates (when combined with time).
(See 256, 640)
remote login  A method of logging into another (distant) computer from the one to which you are currently connected. Once logged in, you can execute commands on the remote computer.
(See 100, 234, 241-243, 645)
Trojan horse  A program within which code is hidden. When the hidden code is triggered, it might release a virus, permit unauthorized access to the computer, or destroy files and data.
(See 262, 263, 649)
virus  A program that, when run, can replicate and embed itself within another program, usually with the intent of doing damage.
(See 41, 261-264)